[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2017-816 ---- ntp

ID: oval:org.secpod.oval:def:1600689Date: (C)2017-04-21   (M)2024-01-29
Class: PATCHFamily: unix




Denial of Service via Malformed Config:A vulnerability was discovered in the NTP servers parsing of configuration directives. A remote, authenticated attacker could cause ntpd to crash by sending a crafted message.Potential Overflows in ctl_put functions:A vulnerability was found in NTP, in the building of response packets with custom fields. If custom fields were configured in ntp.conf with particularly long names, inclusion of these fields in the response packet could cause a buffer overflow, leading to a crash. Improper use of snprintf in mx4200_send:A vulnerability was found in NTP, in the legacy MX4200 refclock implementation. If this refclock was compiled in and used, an attacker may be able to induce stack overflow, leading to a crash or potential code execution.Authenticated DoS via Malicious Config Option:A vulnerability was discovered in the NTP servers parsing of configuration directives. A remote, authenticated attacker could cause ntpd to crash by sending a crafted message.Buffer Overflow in DPTS Clock:A vulnerability was found in NTP, in the parsing of packets from the /dev/datum device. A malicious device could send crafted messages, causing ntpd to crash.

Platform:
Amazon Linux AMI
Product:
ntp
Reference:
ALAS-2017-816
CVE-2017-6464
CVE-2017-6458
CVE-2017-6451
CVE-2017-6463
CVE-2017-6462
CVE    5
CVE-2017-6451
CVE-2017-6458
CVE-2017-6464
CVE-2017-6462
...
CPE    92
cpe:/a:ntp:ntp:4.3.80
cpe:/a:ntp:ntp:4.3.84
cpe:/a:ntp:ntp:4.3.83
cpe:/a:ntp:ntp:4.3.82
...

© SecPod Technologies